WO2020253943A1 - Device and method for gaining access to a medium of a wireless network - Google Patents

Device and method for gaining access to a medium of a wireless network Download PDF

Info

Publication number
WO2020253943A1
WO2020253943A1 PCT/EP2019/065907 EP2019065907W WO2020253943A1 WO 2020253943 A1 WO2020253943 A1 WO 2020253943A1 EP 2019065907 W EP2019065907 W EP 2019065907W WO 2020253943 A1 WO2020253943 A1 WO 2020253943A1
Authority
WO
WIPO (PCT)
Prior art keywords
node
access
medium
nodes
further configured
Prior art date
Application number
PCT/EP2019/065907
Other languages
French (fr)
Inventor
Avi WEITZMAN
Doron Ezri
Shahar PATURY
Oren Hencinski
Ohad Klausner
Xingfeng Jiang
Original Assignee
Huawei Technologies Co., Ltd.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co., Ltd. filed Critical Huawei Technologies Co., Ltd.
Priority to PCT/EP2019/065907 priority Critical patent/WO2020253943A1/en
Priority to EP19731719.1A priority patent/EP3967098A1/en
Publication of WO2020253943A1 publication Critical patent/WO2020253943A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access
    • H04W74/08Non-scheduled access, e.g. ALOHA
    • H04W74/0808Non-scheduled access, e.g. ALOHA using carrier sensing, e.g. carrier sense multiple access [CSMA]
    • H04W74/0816Non-scheduled access, e.g. ALOHA using carrier sensing, e.g. carrier sense multiple access [CSMA] with collision avoidance

Definitions

  • the present invention relates generally to the field of wireless communication networks, and, more particularly, to a device performing an access method to gain access to a medium of a wireless network, and to a corresponding method.
  • the present invention addresses communication systems that uses Listen Before Talk (LBT) access method to access unsilenced bands, for example, the IEEE 802.11, a Fifth Generation (5G) equipment, etc.
  • LBT Listen Before Talk
  • 5G Fifth Generation
  • Wi-Fi Wireless Local Area Networks
  • APs/BSs Access Points and Base Stations
  • the number of APs/BSs is usually larger than the number of available channels, several APs/BSs may be assigned the same channel.
  • the IEEE 802.11 standard defines two access methods, the Distributed Coordination Function (DCF) access method and the Point Coordination Function (PCF) access method.
  • DCF Distributed Coordination Function
  • PCF Point Coordination Function
  • the vast majority of IEEE 802.11 devices (up to 11 ax) use the DCF access methods.
  • the DCF uses a Carrier-Sense Multiple Access with Collision Avoidance (CSMA/CA) algorithm, which is a simple access algorithm that was one of the major contributors to the Wi-Fi huge success.
  • CSMA/CA Carrier-Sense Multiple Access with Collision Avoidance
  • the ETSI EN 301 893 standard defines two access methods for Frame Based Equipment (FBE) and Load Based Equipment (LBE). Furthermore, the LBE access method is similar to 802.11 DCF/EDCA access method.
  • the access delay of DCF method depends on many parameters, for example, the number of active devices sharing the same channel and space, the data frame length, the physical layer (PHY) data rate, a working mode (e.g., Request to Send (RTS)/Clear to Send (CTS), etc.), Quality of Service (QoS) parameters, a collision rate, the interference level, etc.
  • the plain vanilla DCF is considered as the best effort access method, since, by nature, it gives equal access opportunity to all devices that share the medium.
  • the 802.11 Task Groups TGs
  • MIMO Multiple-Input and Multiple-Output
  • 4KQAM modulations
  • a wider bandwidth e.g. 40MHz, 80MHz and 160MHz.
  • WLAN IEEE802.11 designed for simple applications, it became a victim of its own success. Many applications use today the WLAN (e.g., video, audio, AR, VR, etc.), and many new applications may require higher data rates with shorter delay/latency.
  • a communication network e.g., LAN or WLAN latency has both deterministic and random components that are either fixed or scale with the number of the nodes in the system. For instance:
  • Deterministic latency components include the time to transmit information and overhead (i.e., parity bits, reference signals, and control data), constant length hardware computations, and wait times between transmissions.
  • the random components include the time to retransmit information and overhead when necessary, queuing delays, random wait times between transmissions, variable length hardware computations, and software computations for higher layer functions.
  • the importance of each component on overall network latency may depend on the standard and implementation.
  • the WLAN has high latency relative to the LAN systems, for example, may be because of shared medium access that needs to avoid corrupting other devices data.
  • the Wi-Fi overhead may be deterministic or random, as follow:
  • Wi-Fi deterministic overhead are 90 ps to 127 ps for each data access (one or more packet). On top of this, every data packet contains PHY headers (20ps to 108ps), cyclic prefixes (10% or 5%) and idle symbols between aggregation (0 to 8ps)
  • o Back-off before a packet is sent, a node must wait for random back-off time.
  • the back-off is a random number between 0 and Contention Window (CW) (9ps to 9ms).
  • CW Contention Window
  • the chances of collision (2 or more nodes having the same back-off) increase, which increases the probability of re-Tx (hereinafter Tx and transmission is used interchangeably) of the packet.
  • Tx and transmission is used interchangeably
  • re-Tx o Re-transmission
  • Tx time while a node transmits, all other nodes need to suspend their access to the medium, i.e., back-off process (wait at least DIFS again) and wait until medium is idle again.
  • back-off process wait at least DIFS again
  • the new HTg requires long transmissions in order to have reasonable efficiencies when working with high PHY rates, ex. 1 lac 1.7Gbps rate achieves about 75% efficiency with Tx time of 1400ps.
  • the average delay may be determined according to Eq. (1):
  • FIG. 11 illustrates the Wi-Fi delay versus number of nodes for a conventional Wi-Fi system.
  • the conventional Wi-Fi system is capable of supporting high data rates (lGbps to lOGbps) with unbound delay which limits the usage of RT application such as the live video Augmented Reality (AR) and Virtual Reality (VR) over the Wi-Fi.
  • the Wi-Fi average delay 1102 is usually low ( ⁇ 4ms), however, the peek delay 1101 (jitter) may increase to more than 100ms.
  • Major factor that cause the delay are:
  • the 802.11 includes many techniques to reduce the re-Tx probability (e.g., dynamic Tx power, dynamic rate control, beam-forming, smart antenna etc.).
  • the 802.11 uses Enhanced Distributed Channel Access (EDCA) and Orthogonal Frequency-Division Multiple Access (OFDMA) in order to limit/bound the delay, those technique cannot limits the peek delay 1101.
  • EDCA Enhanced Distributed Channel Access
  • OFDMA Orthogonal Frequency-Division Multiple Access
  • Table I Examples of new emerging applications and their worst case latency and throughput requirement.
  • the following conventional methods are suggested for improving the 802.11 delay:
  • the 802.11 EDCA prioritization (QoS): this method enables prioritizing the traffic (VO, VI, BE, BK) by changing the CSMA/CA access parameters (AIFS, CW min , CW max ).
  • the EDCA access gives statistical access priority, therefore, the technique neither bounds the delay nor the jitter in a congested medium.
  • using the high priority QoS parameters (VO/VI) in the congested environment may increase the probability for the re-Tx (particularly when not all of devices support the EDCA).
  • the OFDMA cell coordination this method enables very short delays only when all devices that shares the same channel supports trigger frame access. It has been predicted that until the year 2022, less than half of the Wi-Fi devices will support OFDMA triggered access, and the OFDMA is not considered as a practical solution for the next 5 to 10 years.
  • An objective is to provide a device and method for performing an access method, in order to gain access to a medium of a wireless network, with reduced latency.
  • the device should be able to guarantee a certain access time.
  • embodiments (device and method) of the invention guarantee a certain 802.11/ETSI EN 301 893 FBE or any other FBE access method, access time (for example, when using DCF or EDCA, without limiting the present invention).
  • a first aspect of the invention provides a device for a wireless network, wherein the device is configured to perform an access method, using a plurality of nodes, to gain access to a medium of the wireless network, wherein each node is associated with a different channel of the medium and the access method is performed by using separately each node, transmit data using an active node that has gained access to the medium, and if another node also gains access to the medium after a determined time period from the access of the active node, control the active node to release the medium and to start the access method again, and control the other node to start transmitting data.
  • the device of the first aspect can perform the access method by using the plurality of nodes, in order to gain access to the medium of the wireless network.
  • the device may comprise the plurality of nodes.
  • the device may comprise at least one node.
  • the device may use the nodes and the nodes may not be (e.g., necessary) incorporated in the device, without limiting the present disclosure to a specific configuration of the device.
  • the device of the first aspect may, for example, utilize the diversity capability on the medium access procedure (e.g., the CSMA/CA). For instance, it may be possible, if a single node cannot guarantee a certain access time that the access time may be guaranteed by more than one node.
  • two devices of the first aspect may establish a link, and may communicate over this link by using a plurality of parallel virtual links. Each node of each device is in this case associated with one virtual link of the link. Moreover, at least one of the virtual links or nodes may be active (transmits/receives).
  • the probability that one of the other nodes accesses the medium may be increased, and the active collection between the two devices over the link (including the virtual links provided by the plurality of nodes) may further be preserved.
  • the device of the first aspect may have the advantage of enabling to bond the delay and Jitter of a WLAN system down to few ms, and may further enable the usage of RT, AR and VR applications, etc.
  • the device may comprise a circuitry, which may further comprise hardware and software.
  • the hardware may comprise analog or digital circuitry, or both analog and digital circuitry.
  • the circuitry comprises one or more processors and a non volatile memory connected to the one or more processors.
  • the non-volatile memory may carry executable program code which, when executed by the one or more processors, causes the device to perform the operations or methods described herein.
  • some embodiment of the invention may enable low delay guarantee over a WLAN link (using unlicensed bands) to another device by keeping active communication by combining two or more virtual links (by using multiple nodes). Each of the virtual links implements accessing and using the medium, separately, and may continue maintaining the medium occupied, until one of the other virtual links uses the medium, etc.
  • the device is further configured to, if another node also gains access to the medium before the determined time period from the access of the active node, control the other node to release the medium.
  • the overhead may be decreased to a lower than ⁇ 15%.
  • the device is further configured to, if two or more nodes gain access to the medium at the same time, control all of the two or more nodes except the node having the best performance to release the medium.
  • the device is further configured to constantly perform the access method with each node that has no access to the medium.
  • the device is further configured to delay the release of the medium by the active node and the start of transmitting data using the other node, until a current transmission of the active node is complete.
  • the device is further configured to delay the release of the medium by the active node and the start of transmitting data using the other node, until all node procedures of gaining access to the medium and/or releasing the medium are complete.
  • the device is further configured to determine an average access delay time for each node, wherein the determined time period of the active node is based on the average access delay times of the other nodes.
  • the device is further configured to generate an access Cumulative Distribution Function, CDF, for each node based on its average access delay time, and share the access method CDFs among the nodes.
  • CDF Cumulative Distribution Function
  • the device is further configured to determine whether the determined time period has passed or not based on the CDFs of the nodes.
  • the device is further configured to determine a transmission time for each node, and control the active node to send“IDLE” frames after the actual data transmission time that is determined for the active node has passed.
  • the device is further configured to determine the transmission time for each node based on CDF of other nodes and on an access time reliability requirement.
  • the access method is based on a CSMA/CA method or ETSI EN 301 893 LBE access method and/or any other LBE access method.
  • each node is associated with a virtual link to at least one other device.
  • a second aspect of the invention provides a system comprising a first device according to the first aspect or one of the implementation form of the first aspect, and a second device according to the first aspect or one of the implementation form of the first aspect, wherein each node of the first device, which is associated with a given channel of the medium, is connected over a virtual link with a node of the second device, which is associated with the same given channel.
  • a third aspect of the invention provides a method performed by a device for a wireless network, wherein the method comprises performing an access method, using a plurality of nodes, to gain access to a medium of the wireless network, wherein each node is associated with a different channel of the medium and the access method is performed by using separately each node, transmitting data using an active node that has gained access to the medium, and if another node also gains access to the medium after a determined time period from the access of the active node, controlling the active node to release the medium and to start the access method again, and controlling the other node to start transmitting data.
  • the method further comprises, if another node also gains access to the medium before the determined time period from the access of the active node, controlling the other node to release the medium. In a further implementation form of the third aspect, the method further comprises, if two or more nodes gain access to the medium at the same time, controlling all of the two or more nodes except the node having the best performance to release the medium.
  • the method further comprises constantly performing the access method with each node that has no access to the medium.
  • the method further comprises delaying the release of the medium by the active node and the start of transmitting data using the other node, until a current transmission of the active node is complete.
  • the method further comprises delaying the release of the medium by the active node and the start of transmitting data using the other node, until all node procedures of gaining access to the medium and/or releasing the medium are complete.
  • the method further comprises determining an average access delay time for each node, wherein the determined time period of the active node is based on the average access delay times of the other nodes.
  • the method further comprises generating an access Cumulative Distribution Function, CDF, for each node based on its average access delay time, and share the CDFs among the nodes.
  • CDF Cumulative Distribution Function
  • the method further comprises determining whether the determined time period has passed or not based on the CDFs of the nodes.
  • the method further comprises determining a transmission time for each node, and controlling the active node to send“IDLE” frames after the actual data transmission time that is determined for the active node has passed.
  • the“IDLE” frames may be predefined, for example, it may be some predefined information (i.e., data) being transmitted.
  • the method further comprises determining the transmission time for each node based on the access time CDF of other nodes and on an access time reliability requirement.
  • the access method is based on a CSMA/CA or ETSI EN 301 893 LBE access method and/or any other LBT access methods
  • each node is associated with a virtual link to at least one other device. It has to be noted that all devices, elements, units and means described in the present application could be implemented in the software or hardware elements or any kind of combination thereof. All steps which are performed by the various entities described in the present application as well as the functionalities described to be performed by the various entities are intended to mean that the respective entity is adapted to or configured to perform the respective steps and functionalities.
  • FIG. 1 is a schematic view of a device for a wireless network, according to an embodiment of the present invention.
  • FIG. 2 is a schematic view of a system comprising a first device and a second device, according to an embodiment of the present invention.
  • FIG. 3 exemplarily illustrates access Cumulative Distribution Function (CDF) probability for seven nodes as a function of the delay time.
  • CDF Cumulative Distribution Function
  • FIG. 4 illustrates the maximal delay at 99% for each node from the seven nodes of FIG. 3.
  • FIG. 5 exemplarily illustrates access CDF probability for a set of combined nodes as a function of the delay time.
  • FIG. 6 is another exemplarily illustration of access CDF probability for six nodes as a function of the delay time.
  • FIG. 7 illustrates the maximal delay at 99% for each node from the six nodes of FIG. 6.
  • FIG. 8 is another exemplarily scheme of the system comprising the first device and the second device, according to an embodiment of the present invention.
  • FIG. 9 is a flowchart of performing an access method using the plurality of nodes, according to an embodiment of the present invention.
  • FIG. 10 is a flowchart of a method performed by a device for a wireless network, according to an embodiment of the invention.
  • FIG. 11 illustrates the Wi-Fi delay versus number of nodes for a conventional Wi-Fi system.
  • FIG. 1 is a schematic view of a device 100 for a wireless network 1, according to an embodiment of the present invention.
  • the device 100 is configured to perform an access method, using a plurality of nodes 101, 102, 103, to gain access to a medium of the wireless network, wherein each node 101, 102, 103 is associated with a different channel 111, 112, 113 of the medium and the access method is performed by using separately each node 101, 102, 103.
  • the device 100 is further configured to transmit data using an active node 101 that has gained access to the medium.
  • the node 101 is an active node, without limiting the present disclosure.
  • the device 100 is further configured to, if another node 102, 103 also gains access to the medium after a determined time period from the access of the active node 101, control the active node 101 to release the medium and to start the access method again, and control the other node 102, 103 to start transmitting data.
  • the device 100 of FIG. 1 may comprise a circuitry (not shown in FIG. 1), the circuitry may comprise hardware and software.
  • the hardware may comprise analog or digital circuitry, or both analog and digital circuitry.
  • the circuitry comprises one or more processors and a non-volatile memory connected to the one or more processors.
  • the non volatile memory may carry executable program code which, when executed by the one or more processors, causes the device to perform the operations or methods described herein.
  • FIG. 2 is a schematic view of a system 200 comprising a first device 100 and a second device 100, according to an embodiment of the present invention.
  • the device 100 of the FIG. 1 is incorporated in the system 200 (e.g., as the first device and/or the second device).
  • the system 200 comprises a first device 100.
  • the system 200 further comprises a second device 100.
  • each node 101, 102, 103 of the first device 100 which is associated with a given channel 111, 112, 113 of the medium, is connected over a virtual link with a node 101, 102, 103 of the second device 100, which is associated with the same given channel 111, 112, 1 13.
  • the totality of the virtual links forms a link between the first device 100 and the second device 100.
  • the conventional wireless network (like IEEE802. i l or any other LBT) cannot guarantee the traffic delay nor bound the traffic jitter.
  • the device (and/or the method disclosed in the present invention) may guarantee the access time when using DCF or EDCA or LBE access method.
  • the device 100 may enable low delay guarantee over the 802.11 WLAN link by keeping active communication by combining two or more virtual links (by virtue of the plurality of nodes 101).
  • Each of the nodes may perform the access method to gain access to the medium, separately, and may continue maintaining the medium busy, until one of the other nodes (of another virtual link) access the medium.
  • FIG. 3 exemplarily illustrates access CDF probability for seven nodes as a function of the delay time.
  • the seven virtual links (corresponding to seven nodes 101 for each device 100) includes Tx-1 with an access CDF probability 301, Tx-2 with an access CDF probability 302, Tx-3 with an access CDF probability 303, Tx-4 with an access CDF probability 304, Tx-5 with an access CDF probability 305, Tx- 6 with an access CDF probability 306, and Tx-7 with an access CDF probability 307) may be between two devices 100 (for example, a first device 100 and a second device 100).
  • the virtual link 5 for Tx-5 (with its access CDF probability 305) has 25% access delay of 10ms which is the lowest access delay.
  • the virtual link 1 for Tx-1 (with its access CDF probability 301) may guarantee 38ms at 25% probability. Furthermore, the access time for both virtual link 2 for Tx-2 (with its access CDF probability 302) and the virtual link 3 for the Tx-3 (with its access CDF probability 303) is higher than 15ms at 25% probability.
  • FIG. 4 illustrates the maximal delay at 99% for each node 101 from the plurality of nodes 101 of FIG. 3.
  • the guaranteed delay (i.e, @99%) of each of the virtual links (i.e., for the nodes 101 of the FIG. 3) is illustrated in FIG. 4
  • the virtual link 2 for the Tx-2 (with the access CDF probability 302) may guarantee a maximal delay of 34ms with 99% probability, while the virtual link 5 for the Tx-5 (with the access CDF probability 305) may guarantee only 39ms, etc.
  • Virtual link 1 (Tx-1) may guarantee a delay of 51ms.
  • Virtual link 7 cannot support application that requires bounded delay of less than 70ms. In some embodiments, a lower delay may be obtained based on combining more or all of the above virtual links.
  • FIG. 5 illustrates access CDF probability for combined nodes 101 as a function of the delay time.
  • the sum (Txl :Tx3) indicated with reference number 503 represents combining virtual link 1 with virtual link 2 and virtual link 3, and it may guarantee 15ms delay time at 99% (vs above 15ms @25% for those virtual links).
  • FIG. 6 is another exemplarily illustration of access CDF probability for six nodes 101 as a function of the delay time.
  • a TxOP of less than 4ms may provide the 10ms delay time by using the above virtual links.
  • FIG. 8 which is another exemplarily scheme of the system 200 comprising the first device 100 and the second device 100, according to an embodiment of the present invention.
  • N N>2 virtual links are illustrated to form a link between the two devices 100. Accordingly, each device uses N nodes 101. Moreover, in order to overcome the inability of the WLAN (that uses LBT access method) to guarantee an access, a constant active (virtual) link is kept between at least one node 101 of each device 100, for example, at least one of the virtual links is active.
  • each virtual link may be using different overlap or non-overlap channels, while performing the access method, simultaneously, using the CSMA/CA and the RTS/CTS technique (e.g., to prevent collisions on data).
  • the first Tx node 101 that gains access to the medium also referred to as the pivot Tx
  • the pivot Tx may start sending the data for the TxOP period of T [ms].
  • RTS/CTS the pivot Tx
  • one of the following scenarios may occur:
  • the Tx node 101 will become the pivot Tx, after the current pivot Tx finishes the current aggregation transmission (and start the access procedure). • Otherwise it releases the NAV (sends a control frame with short NAV) and starts the access procedure again.
  • the pivot Tx will be the node 101 associated with the virtual link having the best performance, and the other nodes 101 should release the NAV.
  • FIG. 9 is a flowchart of performing an access method 900 using the plurality of nodes 101, 102... Tx-N, according to an embodiment of the present invention.
  • the method may be performed by the device 100 (and/or the system 200 and/or the first device 100 of the system 200 and/or the second device 100 of the system 200).
  • the method 900 is exemplarily discussed based on being performed by the node 101 (e.g., node Tx-1 in FIG. 9) of the device 100.
  • the node Tx-1 (e.g., node 101) accesses the medium of the wireless network.
  • Each node 101 may calculate its minimal Tx time (Tm) and may return to the IDLE period (K m ). When the RT application is activated, all the nodes 101 may start the access procedure to the medium.
  • the node Tx-1 (e.g., node 101) sends the request to send parameters.
  • the node Tx-1 determines if the CTS is Timeout or not. When it is determined“Yes”, the node Tx-1 goes back to the step 901. However, when it is determined “No”, the Tx-1 goes to step 904.
  • the node Tx-1 determines if other Tx nodes are also active or not. When it is determined“Yes”, the node Tx-1 goes to step 905. However, when it is determined“No”, the Tx-1 goes to step 908.
  • the first node 101 that accesses the medium starts sending the application packets. Moreover, if more than one node 101 accesses the medium, the“best” node 101 is selected.
  • an access process may include, for example, AIFS, BEB, Tx of RTS and Rx of CTS.
  • the node Tx-1 determines if the“best” Good-put. For example, if it determines“No”, it goes to step 901, and if it determines“Yes”, it goes to step 906.
  • the node Tx-1 determines the delay. For example, if it determines“Yes” (i.e., the delay time>K), it goes to step 907, and if it determines“No”, it goes to step 901.
  • the node Tx-1 (e.g., nodelOl) waits until the pivot ends.
  • the node Tx-1 (e.g., nodelOl) transmits data.
  • the number of required virtual links and/or nodes 101 may depend on application requirements, deployment type, and medium congestion
  • N the number of the nodes 101
  • P the required success probability, for example, it may be defined by application QoS requirements.
  • T m minimal transmit period for the node m, for example, it may be determined according t
  • the node 101 When the node 101 gains access to the medium of the wireless network, while the Pivot node 101 is active, it may defer from the channel, if the access time difference between the two nodes Km is:
  • FIG. 10 shows a method 1000 performed by a device 100 for a wireless network 1, according to an embodiment of the invention.
  • the method 1000 may be carried out by the device 100 (and/or the system 200 and/or the first device 100 of the system 200 and/or the second device 100 of the system 200), as it described above, without limiting the present disclosure.
  • the method 1000 comprises a step 1001 of performing an access method, using a plurality of nodes 101, 102, 103, to gain access to a medium of the wireless network, wherein each node 101, 102, 103 is associated with a different channel 111, 112, 113 of the medium and the access method is performed by using separately each node 101, 102, 103.
  • the method 1000 further comprises a step 1002 of transmitting data using an active node 101 that has gained access to the medium.
  • the method 1000 further comprises a step 1003 of, if another node 102, 103 also gains access to the medium after a determined time period from the access of the active node 101, controlling the active node 101 to release the medium and to starting the access method again, and controlling the other node 102, 103 to start transmitting data.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

A device for a wireless network is disclosed. The device is configured to perform an access method, using a plurality of nodes, to gain access to a medium of the wireless network, wherein each node is associated with a different channel of the medium and the access method is performed by using separately each node. The device is further configured to transmit data using an active node that has gained access to the medium. Moreover, the device is further configured to, if another node also gains access to the medium after a determined time period from the access of the active node, control the active node to release the medium and to start the access method again, and control the other node to start transmitting data.

Description

DEVICE AND METHOD FOR GAINING ACCESS TO A MEDIUM OF A WIRELESS
NETWORK
TECHNICAL FIELD
The present invention relates generally to the field of wireless communication networks, and, more particularly, to a device performing an access method to gain access to a medium of a wireless network, and to a corresponding method. The present invention addresses communication systems that uses Listen Before Talk (LBT) access method to access unsilenced bands, for example, the IEEE 802.11, a Fifth Generation (5G) equipment, etc.
BACKGROUND
Generally, the IEEE 802.11 based Wireless Local Area Networks (WLANs) became popular at an unprecedented rate. The conventional WLAN supports a variety of data transfer including (and not just) file transfer, emails, web browsing and real time applications such as audio and video. The IEEE 802.11 (Wi-Fi) defines several unlicensed bands (for example, 2.4GHz, 5GHz and 6GHz). Moreover, in order to increase the system capabilities (capacity), several Access Points and Base Stations (APs/BSs) may share the same space, however, they may use different channel(s) to minimize the interference. In addition, since in many distributions (i.e. HD/VHD distribution) the number of APs/BSs is usually larger than the number of available channels, several APs/BSs may be assigned the same channel. The IEEE 802.11 standard defines two access methods, the Distributed Coordination Function (DCF) access method and the Point Coordination Function (PCF) access method. The vast majority of IEEE 802.11 devices (up to 11 ax) use the DCF access methods. The DCF uses a Carrier-Sense Multiple Access with Collision Avoidance (CSMA/CA) algorithm, which is a simple access algorithm that was one of the major contributors to the Wi-Fi huge success.
The ETSI EN 301 893 standard defines two access methods for Frame Based Equipment (FBE) and Load Based Equipment (LBE). Furthermore, the LBE access method is similar to 802.11 DCF/EDCA access method. The access delay of DCF method depends on many parameters, for example, the number of active devices sharing the same channel and space, the data frame length, the physical layer (PHY) data rate, a working mode (e.g., Request to Send (RTS)/Clear to Send (CTS), etc.), Quality of Service (QoS) parameters, a collision rate, the interference level, etc.
Conventionally, the plain vanilla DCF is considered as the best effort access method, since, by nature, it gives equal access opportunity to all devices that share the medium. In addition, in order to increase the wireless throughput, the 802.11 Task Groups (TGs) maximize the spectral efficiency by adding the Multiple-Input and Multiple-Output (MIMO) technologies, using higher modulations (e.g., 1KQAM) and a wider bandwidth (e.g., 40MHz, 80MHz and 160MHz). These efforts have been (extremely) successful, as it is seen by the continued growth of data rates in the WLAN and the cellular standards. However, the gain comes at the cost of secondary system parameters, such as latency, that do not fit directly into information theory’s current framework. This is seen as an acceptable tradeoff as long as the user experience is not impacted, for example, for WEB browsing, file downloading, etc. Although initially WLAN as IEEE802.11 designed for simple applications, it became a victim of its own success. Many applications use today the WLAN (e.g., video, audio, AR, VR, etc.), and many new applications may require higher data rates with shorter delay/latency.
A communication network’s (e.g., LAN or WLAN) latency has both deterministic and random components that are either fixed or scale with the number of the nodes in the system. For instance:
• The deterministic components set the minimum latency, while the random components shape the latency’s distribution. Deterministic latency components include the time to transmit information and overhead (i.e., parity bits, reference signals, and control data), constant length hardware computations, and wait times between transmissions.
• The random components include the time to retransmit information and overhead when necessary, queuing delays, random wait times between transmissions, variable length hardware computations, and software computations for higher layer functions. The importance of each component on overall network latency may depend on the standard and implementation. Furthermore, the WLAN has high latency relative to the LAN systems, for example, may be because of shared medium access that needs to avoid corrupting other devices data. The Wi-Fi overhead may be deterministic or random, as follow:
• Deterministic: the access time (Arbitration Inter-Frame Spacing (AIFS)), PHY headers (preamble) and acknowledgement (ACK). The Wi-Fi deterministic overhead are 90 ps to 127 ps for each data access (one or more packet). On top of this, every data packet contains PHY headers (20ps to 108ps), cyclic prefixes (10% or 5%) and idle symbols between aggregation (0 to 8ps)
• Random:
o Back-off: before a packet is sent, a node must wait for random back-off time.
The back-off is a random number between 0 and Contention Window (CW) (9ps to 9ms). As the number of nodes increases, the chances of collision (2 or more nodes having the same back-off) increase, which increases the probability of re-Tx (hereinafter Tx and transmission is used interchangeably) of the packet. In order to reduce the collision probability, it may be required to increase the contention window, which increases the access time.
o Re-transmission (re-Tx): when a receiver does not succeed to decode a packet (collision, noise, or fading), a new packet must be sent, this increases the medium load and the packet delay.
o Transmission (Tx) time: while a node transmits, all other nodes need to suspend their access to the medium, i.e., back-off process (wait at least DIFS again) and wait until medium is idle again. The new HTg requires long transmissions in order to have reasonable efficiencies when working with high PHY rates, ex. 1 lac 1.7Gbps rate achieves about 75% efficiency with Tx time of 1400ps.
For the Wi-Fi delay when n nodes shares the media, the average delay may be determined according to Eq. (1):
Figure imgf000005_0001
FIG. 11 illustrates the Wi-Fi delay versus number of nodes for a conventional Wi-Fi system. The conventional Wi-Fi system is capable of supporting high data rates (lGbps to lOGbps) with unbound delay which limits the usage of RT application such as the live video Augmented Reality (AR) and Virtual Reality (VR) over the Wi-Fi. Moreover, the Wi-Fi average delay 1102 is usually low (<4ms), however, the peek delay 1101 (jitter) may increase to more than 100ms. Major factor that cause the delay are:
• Number of Re-Tx: The 802.11 includes many techniques to reduce the re-Tx probability (e.g., dynamic Tx power, dynamic rate control, beam-forming, smart antenna etc.).
· Access time (particularly in congestion medium - large number of nodes with high data load): the 802.11 uses Enhanced Distributed Channel Access (EDCA) and Orthogonal Frequency-Division Multiple Access (OFDMA) in order to limit/bound the delay, those technique cannot limits the peek delay 1101.
However, many emerging time sensitive applications require a predictable and more accurate time synchronization. This usually requires low(er) latency. Furthermore, the reliability requirements vary per application, however, some need a predictable worst case latency with a high reliability (>98%). Table I describes examples of some new emerging applications and their worst case latency and throughput requirement.
Figure imgf000006_0001
Table I: Examples of new emerging applications and their worst case latency and throughput requirement. In addition, the following conventional methods are suggested for improving the 802.11 delay:
• The 802.11 EDCA prioritization (QoS): this method enables prioritizing the traffic (VO, VI, BE, BK) by changing the CSMA/CA access parameters (AIFS, CWmin, CWmax). The EDCA access gives statistical access priority, therefore, the technique neither bounds the delay nor the jitter in a congested medium. Furthermore, using the high priority QoS parameters (VO/VI) in the congested environment may increase the probability for the re-Tx (particularly when not all of devices support the EDCA).
• The 802.11 PCF cell coordination access: although this technique provided a good access time, however, it was removed from 802.11 by 802.1 lax task group.
• The OFDMA cell coordination: this method enables very short delays only when all devices that shares the same channel supports trigger frame access. It has been predicted that until the year 2022, less than half of the Wi-Fi devices will support OFDMA triggered access, and the OFDMA is not considered as a practical solution for the next 5 to 10 years.
SUMMARY
In view of the above-mentioned challenges and disadvantages, embodiments of the present invention aim to improve the conventional devices and methods. An objective is to provide a device and method for performing an access method, in order to gain access to a medium of a wireless network, with reduced latency. In particular, the device should be able to guarantee a certain access time.
The objective is achieved by the embodiments provided in the enclosed independent claims. Advantageous implementations of the embodiments are further defined in the dependent claims.
In particular, embodiments (device and method) of the invention guarantee a certain 802.11/ETSI EN 301 893 FBE or any other FBE access method, access time (for example, when using DCF or EDCA, without limiting the present invention).
A first aspect of the invention provides a device for a wireless network, wherein the device is configured to perform an access method, using a plurality of nodes, to gain access to a medium of the wireless network, wherein each node is associated with a different channel of the medium and the access method is performed by using separately each node, transmit data using an active node that has gained access to the medium, and if another node also gains access to the medium after a determined time period from the access of the active node, control the active node to release the medium and to start the access method again, and control the other node to start transmitting data.
The device of the first aspect can perform the access method by using the plurality of nodes, in order to gain access to the medium of the wireless network. In some embodiments, the device may comprise the plurality of nodes. In some embodiments, the device may comprise at least one node. In some embodiments the device may use the nodes and the nodes may not be (e.g., necessary) incorporated in the device, without limiting the present disclosure to a specific configuration of the device.
The device of the first aspect may, for example, utilize the diversity capability on the medium access procedure (e.g., the CSMA/CA). For instance, it may be possible, if a single node cannot guarantee a certain access time that the access time may be guaranteed by more than one node. For example, two devices of the first aspect may establish a link, and may communicate over this link by using a plurality of parallel virtual links. Each node of each device is in this case associated with one virtual link of the link. Moreover, at least one of the virtual links or nodes may be active (transmits/receives). Furthermore, by extending the node usage (using 802.1 1 TxOP), the probability that one of the other nodes accesses the medium may be increased, and the active collection between the two devices over the link (including the virtual links provided by the plurality of nodes) may further be preserved.
The device of the first aspect may have the advantage of enabling to bond the delay and Jitter of a WLAN system down to few ms, and may further enable the usage of RT, AR and VR applications, etc.
Moreover, the device may comprise a circuitry, which may further comprise hardware and software. The hardware may comprise analog or digital circuitry, or both analog and digital circuitry. In some embodiments, the circuitry comprises one or more processors and a non volatile memory connected to the one or more processors. The non-volatile memory may carry executable program code which, when executed by the one or more processors, causes the device to perform the operations or methods described herein. Moreover, some embodiment of the invention, may enable low delay guarantee over a WLAN link (using unlicensed bands) to another device by keeping active communication by combining two or more virtual links (by using multiple nodes). Each of the virtual links implements accessing and using the medium, separately, and may continue maintaining the medium occupied, until one of the other virtual links uses the medium, etc.
In an implementation form of the first aspect, the device is further configured to, if another node also gains access to the medium before the determined time period from the access of the active node, control the other node to release the medium.
This is beneficial, since it may be possible to minimal the overhead on the full network exist load. For example, in some embodiments, the overhead may be decreased to a lower than <15%.
In a further implementation form of the first aspect, the device is further configured to, if two or more nodes gain access to the medium at the same time, control all of the two or more nodes except the node having the best performance to release the medium.
In a further implementation form of the first aspect, the device is further configured to constantly perform the access method with each node that has no access to the medium.
In a further implementation form of the first aspect, the device is further configured to delay the release of the medium by the active node and the start of transmitting data using the other node, until a current transmission of the active node is complete.
In a further implementation form of the first aspect, the device is further configured to delay the release of the medium by the active node and the start of transmitting data using the other node, until all node procedures of gaining access to the medium and/or releasing the medium are complete.
In a further implementation form of the first aspect, the device is further configured to determine an average access delay time for each node, wherein the determined time period of the active node is based on the average access delay times of the other nodes.
In a further implementation form of the first aspect, the device is further configured to generate an access Cumulative Distribution Function, CDF, for each node based on its average access delay time, and share the access method CDFs among the nodes. In a further implementation form of the first aspect, the device is further configured to determine whether the determined time period has passed or not based on the CDFs of the nodes.
In a further implementation form of the first aspect, the device is further configured to determine a transmission time for each node, and control the active node to send“IDLE” frames after the actual data transmission time that is determined for the active node has passed.
In a further implementation form of the first aspect, the device is further configured to determine the transmission time for each node based on CDF of other nodes and on an access time reliability requirement.
In a further implementation form of the first aspect, the access method is based on a CSMA/CA method or ETSI EN 301 893 LBE access method and/or any other LBE access method.
In a further implementation form of the first aspect, each node is associated with a virtual link to at least one other device.
A second aspect of the invention provides a system comprising a first device according to the first aspect or one of the implementation form of the first aspect, and a second device according to the first aspect or one of the implementation form of the first aspect, wherein each node of the first device, which is associated with a given channel of the medium, is connected over a virtual link with a node of the second device, which is associated with the same given channel.
A third aspect of the invention provides a method performed by a device for a wireless network, wherein the method comprises performing an access method, using a plurality of nodes, to gain access to a medium of the wireless network, wherein each node is associated with a different channel of the medium and the access method is performed by using separately each node, transmitting data using an active node that has gained access to the medium, and if another node also gains access to the medium after a determined time period from the access of the active node, controlling the active node to release the medium and to start the access method again, and controlling the other node to start transmitting data.
In an implementation form of the third aspect, the method further comprises, if another node also gains access to the medium before the determined time period from the access of the active node, controlling the other node to release the medium. In a further implementation form of the third aspect, the method further comprises, if two or more nodes gain access to the medium at the same time, controlling all of the two or more nodes except the node having the best performance to release the medium.
In a further implementation form of the third aspect, the method further comprises constantly performing the access method with each node that has no access to the medium.
In a further implementation form of the third aspect, the method further comprises delaying the release of the medium by the active node and the start of transmitting data using the other node, until a current transmission of the active node is complete.
In a further implementation form of the third aspect, the method further comprises delaying the release of the medium by the active node and the start of transmitting data using the other node, until all node procedures of gaining access to the medium and/or releasing the medium are complete.
In a further implementation form of the third aspect, the method further comprises determining an average access delay time for each node, wherein the determined time period of the active node is based on the average access delay times of the other nodes.
In a further implementation form of the third aspect, the method further comprises generating an access Cumulative Distribution Function, CDF, for each node based on its average access delay time, and share the CDFs among the nodes.
In a further implementation form of the third aspect, the method further comprises determining whether the determined time period has passed or not based on the CDFs of the nodes.
In a further implementation form of the third aspect, the method further comprises determining a transmission time for each node, and controlling the active node to send“IDLE” frames after the actual data transmission time that is determined for the active node has passed.
In particular, the“IDLE” frames may be predefined, for example, it may be some predefined information (i.e., data) being transmitted.
In a further implementation form of the third aspect, the method further comprises determining the transmission time for each node based on the access time CDF of other nodes and on an access time reliability requirement. In a further implementation form of the third aspect, the access method is based on a CSMA/CA or ETSI EN 301 893 LBE access method and/or any other LBT access methods
In a further implementation form of the third aspect, each node is associated with a virtual link to at least one other device. It has to be noted that all devices, elements, units and means described in the present application could be implemented in the software or hardware elements or any kind of combination thereof. All steps which are performed by the various entities described in the present application as well as the functionalities described to be performed by the various entities are intended to mean that the respective entity is adapted to or configured to perform the respective steps and functionalities. Even if, in the following description of specific embodiments, a specific functionality or step to be performed by external entities is not reflected in the description of a specific detailed element of that entity which performs that specific step or functionality, it should be clear for a skilled person that these methods and functionalities can be implemented in respective software or hardware elements, or any kind of combination thereof.
BRIEF DESCRIPTION OF DRAWINGS
The above described aspects and implementation forms of the present invention will be explained in the following description of specific embodiments in relation to the enclosed drawings, in which FIG. 1 is a schematic view of a device for a wireless network, according to an embodiment of the present invention.
FIG. 2 is a schematic view of a system comprising a first device and a second device, according to an embodiment of the present invention.
FIG. 3 exemplarily illustrates access Cumulative Distribution Function (CDF) probability for seven nodes as a function of the delay time.
FIG. 4 illustrates the maximal delay at 99% for each node from the seven nodes of FIG. 3.
FIG. 5 exemplarily illustrates access CDF probability for a set of combined nodes as a function of the delay time. FIG. 6 is another exemplarily illustration of access CDF probability for six nodes as a function of the delay time.
FIG. 7 illustrates the maximal delay at 99% for each node from the six nodes of FIG. 6. FIG. 8 is another exemplarily scheme of the system comprising the first device and the second device, according to an embodiment of the present invention.
FIG. 9 is a flowchart of performing an access method using the plurality of nodes, according to an embodiment of the present invention.
FIG. 10 is a flowchart of a method performed by a device for a wireless network, according to an embodiment of the invention.
FIG. 11 illustrates the Wi-Fi delay versus number of nodes for a conventional Wi-Fi system.
DETAILED DESCRIPTION OF EMBODIMENTS
FIG. 1 is a schematic view of a device 100 for a wireless network 1, according to an embodiment of the present invention.
The device 100 is configured to perform an access method, using a plurality of nodes 101, 102, 103, to gain access to a medium of the wireless network, wherein each node 101, 102, 103 is associated with a different channel 111, 112, 113 of the medium and the access method is performed by using separately each node 101, 102, 103.
The device 100 is further configured to transmit data using an active node 101 that has gained access to the medium. In the embodiment of FIG. 1, it is exemplarily illustrated that the node 101 is an active node, without limiting the present disclosure.
The device 100 is further configured to, if another node 102, 103 also gains access to the medium after a determined time period from the access of the active node 101, control the active node 101 to release the medium and to start the access method again, and control the other node 102, 103 to start transmitting data.
The device 100 of FIG. 1 may comprise a circuitry (not shown in FIG. 1), the circuitry may comprise hardware and software. The hardware may comprise analog or digital circuitry, or both analog and digital circuitry. In some embodiments, the circuitry comprises one or more processors and a non-volatile memory connected to the one or more processors. The non volatile memory may carry executable program code which, when executed by the one or more processors, causes the device to perform the operations or methods described herein.
FIG. 2 is a schematic view of a system 200 comprising a first device 100 and a second device 100, according to an embodiment of the present invention.
Without limiting the present disclosure, it is assumed that the device 100 of the FIG. 1 is incorporated in the system 200 (e.g., as the first device and/or the second device). The system 200 comprises a first device 100. The system 200 further comprises a second device 100.
Moreover, each node 101, 102, 103 of the first device 100, which is associated with a given channel 111, 112, 113 of the medium, is connected over a virtual link with a node 101, 102, 103 of the second device 100, which is associated with the same given channel 111, 112, 1 13. The totality of the virtual links forms a link between the first device 100 and the second device 100.
As discussed, the conventional wireless network (like IEEE802. i l or any other LBT) cannot guarantee the traffic delay nor bound the traffic jitter. The device (and/or the method disclosed in the present invention) may guarantee the access time when using DCF or EDCA or LBE access method. For example, the device 100 may enable low delay guarantee over the 802.11 WLAN link by keeping active communication by combining two or more virtual links (by virtue of the plurality of nodes 101). Each of the nodes may perform the access method to gain access to the medium, separately, and may continue maintaining the medium busy, until one of the other nodes (of another virtual link) access the medium.
FIG. 3 exemplarily illustrates access CDF probability for seven nodes as a function of the delay time.
It is assumed that, there are seven virtual links between two devices. The seven virtual links (corresponding to seven nodes 101 for each device 100) includes Tx-1 with an access CDF probability 301, Tx-2 with an access CDF probability 302, Tx-3 with an access CDF probability 303, Tx-4 with an access CDF probability 304, Tx-5 with an access CDF probability 305, Tx- 6 with an access CDF probability 306, and Tx-7 with an access CDF probability 307) may be between two devices 100 (for example, a first device 100 and a second device 100). Moreover, the virtual link 5 for Tx-5 (with its access CDF probability 305) has 25% access delay of 10ms which is the lowest access delay. The virtual link 1 for Tx-1 (with its access CDF probability 301) may guarantee 38ms at 25% probability. Furthermore, the access time for both virtual link 2 for Tx-2 (with its access CDF probability 302) and the virtual link 3 for the Tx-3 (with its access CDF probability 303) is higher than 15ms at 25% probability.
FIG. 4 illustrates the maximal delay at 99% for each node 101 from the plurality of nodes 101 of FIG. 3. The guaranteed delay (i.e, @99%) of each of the virtual links (i.e., for the nodes 101 of the FIG. 3) is illustrated in FIG. 4
As it is shown, the virtual link 2 for the Tx-2 (with the access CDF probability 302) may guarantee a maximal delay of 34ms with 99% probability, while the virtual link 5 for the Tx-5 (with the access CDF probability 305) may guarantee only 39ms, etc.
It may be derived from FIG. 4 that:
• The above virtual links cannot individually support application that requires bounded delay of less than 30ms.
· Only virtual link 2 (Tx-2) and the virtual link 5 (Tx-5) supports application that requires bounded delay of less than 40ms.
• Virtual link 1 (Tx-1) may guarantee a delay of 51ms.
• Virtual link 7 (Tx-7) cannot support application that requires bounded delay of less than 70ms. In some embodiments, a lower delay may be obtained based on combining more or all of the above virtual links.
FIG. 5 illustrates access CDF probability for combined nodes 101 as a function of the delay time.
As it can be derived from FIG. 5, the sum (Txl :Tx3) indicated with reference number 503 represents combining virtual link 1 with virtual link 2 and virtual link 3, and it may guarantee 15ms delay time at 99% (vs above 15ms @25% for those virtual links).
Moreover, the sum (Txl :Tx5) indicated with reference number 505 represents combining virtual links 1 to 5, and it may guarantee the delay time of less than 5ms with a probability of @99%, which may suitable for most of the RT applications. FIG. 6 is another exemplarily illustration of access CDF probability for six nodes 101 as a function of the delay time.
It is assumed that, there are six virtual links (corresponding to six nodes 101) (including Tx-1 with the access CDF probability 301 , Tx-2 with the access CDF probability 302, Tx-3 with the access CDF probability 303, Tx-4 with the access CDF probability 304, Tx-5 with the access CDF probability 305 and Tx-6 with the access CDF probability 306) between the two devices 100 (for example, a first device 100 and a second device 100).
Moreover, as it can be derived from FIG. 6, the above virtual links cannot guarantee individually a delay of less than 20ms at 99.9%.
Furthermore, assuming that an application requires a maximal delay of 10ms, the TxOP for all the six virtual links of FIG. 6 is illustrated in FIG. 7.
As it can be derived from FIG. 7, a TxOP of less than 4ms may provide the 10ms delay time by using the above virtual links.
FIG. 8 which is another exemplarily scheme of the system 200 comprising the first device 100 and the second device 100, according to an embodiment of the present invention.
In the exemplarily scheme of the system 200 in FIG. 8, N (N>2) virtual links are illustrated to form a link between the two devices 100. Accordingly, each device uses N nodes 101. Moreover, in order to overcome the inability of the WLAN (that uses LBT access method) to guarantee an access, a constant active (virtual) link is kept between at least one node 101 of each device 100, for example, at least one of the virtual links is active.
Moreover, each virtual link (from the above N) may be using different overlap or non-overlap channels, while performing the access method, simultaneously, using the CSMA/CA and the RTS/CTS technique (e.g., to prevent collisions on data). Furthermore, the first Tx node 101 that gains access to the medium (also referred to as the pivot Tx) may start sending the data for the TxOP period of T [ms]. Moreover, when another Tx node 101 gains access to the medium (after RTS/CTS) after that the pivot Tx has gained access, one of the following scenarios may occur:
• If the time period between the current pivot and the Tx node 101 that accesses the medium is larger than K, the Tx node 101 will become the pivot Tx, after the current pivot Tx finishes the current aggregation transmission (and start the access procedure). • Otherwise it releases the NAV (sends a control frame with short NAV) and starts the access procedure again.
However, when more than one nodes 101 gains access to the medium at the same time, the pivot Tx will be the node 101 associated with the virtual link having the best performance, and the other nodes 101 should release the NAV.
FIG. 9 is a flowchart of performing an access method 900 using the plurality of nodes 101, 102... Tx-N, according to an embodiment of the present invention.
The method may be performed by the device 100 (and/or the system 200 and/or the first device 100 of the system 200 and/or the second device 100 of the system 200).
Without limiting the present disclosure, in the following the method 900 is exemplarily discussed based on being performed by the node 101 (e.g., node Tx-1 in FIG. 9) of the device 100.
At 901, the node Tx-1 (e.g., node 101) accesses the medium of the wireless network.
For example, each node 101 may collect access delay time and build its access as a list of short time period steps (e.g., Dί=1 ms), this CDF access function is further shared with all of the other nodes 101. Each node 101 may calculate its minimal Tx time (Tm) and may return to the IDLE period (Km). When the RT application is activated, all the nodes 101 may start the access procedure to the medium.
At 902, the node Tx-1 (e.g., node 101) sends the request to send parameters.
At 903, the node Tx-1 (e.g., node 101) determines if the CTS is Timeout or not. When it is determined“Yes”, the node Tx-1 goes back to the step 901. However, when it is determined “No”, the Tx-1 goes to step 904.
At 904, the node Tx-1 (e.g., nodelOl) determines if other Tx nodes are also active or not. When it is determined“Yes”, the node Tx-1 goes to step 905. However, when it is determined“No”, the Tx-1 goes to step 908.
For example, the first node 101 that accesses the medium (called a Pivot node) starts sending the application packets. Moreover, if more than one node 101 accesses the medium, the“best” node 101 is selected. Moreover, an access process may include, for example, AIFS, BEB, Tx of RTS and Rx of CTS.
At 905, the node Tx-1 (e.g., nodelOl) determines if the“best” Good-put. For example, if it determines“No”, it goes to step 901, and if it determines“Yes”, it goes to step 906.
At 906, the node Tx-1 (e.g., nodelOl) determines the delay. For example, if it determines“Yes” (i.e., the delay time>K), it goes to step 907, and if it determines“No”, it goes to step 901.
At 907, the node Tx-1 (e.g., nodelOl) waits until the pivot ends.
For example, the node 101 may continue to use the medium for TxOP = Tm, if it finishes sending all packets the Tx node 101 keeps using the virtual link by sending IDEE frames. Moreover, if during the TxOP another node 101 accesses the medium, the Pivot node finishes the last Tx and releases the medium.
At 908, the node Tx-1 (e.g., nodelOl) transmits data.
Furthermore, the number of required virtual links and/or nodes 101 may depend on application requirements, deployment type, and medium congestion
The above discussed algorithm may use the following few parameters:
• N : the number of the nodes 101
• P: the required success probability, for example, it may be defined by application QoS requirements.
• Tm: minimal transmit period for the node m, for example, it may be determined according t
Figure imgf000018_0001
• When the node 101 gains access to the medium of the wireless network, while the Pivot node 101 is active, it may defer from the channel, if the access time difference between the two nodes Km is:
Figure imgf000018_0002
FIG. 10 shows a method 1000 performed by a device 100 for a wireless network 1, according to an embodiment of the invention. The method 1000 may be carried out by the device 100 (and/or the system 200 and/or the first device 100 of the system 200 and/or the second device 100 of the system 200), as it described above, without limiting the present disclosure.
The method 1000 comprises a step 1001 of performing an access method, using a plurality of nodes 101, 102, 103, to gain access to a medium of the wireless network, wherein each node 101, 102, 103 is associated with a different channel 111, 112, 113 of the medium and the access method is performed by using separately each node 101, 102, 103.
The method 1000 further comprises a step 1002 of transmitting data using an active node 101 that has gained access to the medium. The method 1000 further comprises a step 1003 of, if another node 102, 103 also gains access to the medium after a determined time period from the access of the active node 101, controlling the active node 101 to release the medium and to starting the access method again, and controlling the other node 102, 103 to start transmitting data.
The present invention has been described in conjunction with various embodiments as examples as well as implementations. However, other variations can be understood and effected by those persons skilled in the art and practicing the claimed invention, from the studies of the drawings, this disclosure and the independent claims. In the claims as well as in the description the word “comprising” does not exclude other elements or steps and the indefinite article“a” or“an” does not exclude a plurality. A single element or other unit may fulfill the functions of several entities or items recited in the claims. The mere fact that certain measures are recited in the mutual different dependent claims does not indicate that a combination of these measures cannot be used in an advantageous implementation.

Claims

Claims
1. A device (100) for a wireless network (1), wherein the device is configured to:
perform an access method, using a plurality of nodes (101, 102, 103), to gain access to a medium of the wireless network (1),
wherein each node (101, 102, 103) is associated with a different channel (111, 112,
113) of the medium and the access method is performed by using separately each node (101, 102, 103),
transmit data using an active node (101) that has gained access to the medium, and if another node (102, 103) also gains access to the medium after a determined time period from the access of the active node (101), control the active node (101) to release the medium and to start the access method again, and control the other node (102, 103) to start transmitting data.
2. The device (100) according to claim 1, further configured to:
if another node (102, 103) also gains access to the medium before the determined time period from the access of the active node (101), control the other node (102, 103) to release the medium.
3. The device (100) according to claim 1 or 2, further configured to:
if two or more nodes (101, 102, 103) gain access to the medium at the same time, control all of the two or more nodes (101, 102, 103) except the node having the best performance to release the medium.
4. The device (100) according to one of the claims 1 to 3, further configured to:
constantly perform the access method with each node (102, 103) that has no access to the medium.
5. The device (100) according to one of the claims 1 to 4, further configured to:
delay the release of the medium by the active node (101) and the start of transmitting data using the other node (102, 103), until a current transmission of the active node (101) is complete.
6. The device (100) according to one of the claims 1 to 5, further configured to:
delay the release of the medium by the active node (101) and the start of transmitting data using the other node (102, 103), until all node procedures of gaining access to the medium and/or releasing the medium are complete.
7. The device (100) according to one of the claims 1 to 6, further configured to:
determine an average access delay time for each node (101, 102, 103),
wherein the determined time period of the active node (101) is based on the average access delay times of the other nodes (102, 103).
8. The device (100) according to claim 7, further configured to:
generate an access Cumulative Distribution Function, CDF, for each node (101, 102,
103) based on its average access delay time, and
share the CDFs among the nodes (101, 102, 103).
9. The device (100) according to claim 8, further configured to:
determine whether the determined time period has passed or not based on the CDFs of the nodes (101, 102, 103).
10. The device (100) according to one of the claims 7 to 9, further configured to:
determine a transmission time for each node (101, 102, 103), and
control the active node (101) to send“IDLE” frames after the actual data transmission time that is determined for the active node (101) has passed.
11. The device (100) according to one of the claims 8 to 10, further configured to:
determine the transmission time for each node (101, 102, 103) based on CDF of other nodes and on an access time reliability requirement.
12. The device (100) according to one of the claims 1 to 11, wherein:
the access method is based on a Carrier-Sense Multiple Access with Collusion Avoidance, CSMA/CA, method or ETSI EN 301 893 LBE access method and/or any other LBE access method.
13. The device (100) according to one of the claims 1 to 12, wherein:
each node (101, 102, 103) is associated with a virtual link to at least one other device.
14. A system (200) comprising:
a first device (100) according to one of the claims 1 to 13, and
a second device (100) according to one of the claims 1 to 13,
wherein each node (101, 102, 103) of the first device (100), which is associated with a given channel (111, 112, 113) of the medium, is connected over a virtual link with a node (101, 102, 103) of the second device (100), which is associated with the same given channel (111, 112, 113).
15. A method (1000) performed by a device (100) for a wireless network (1), wherein the method comprises:
performing (1001) an access method, using a plurality of nodes (101, 102, 103), to gain access to a medium of the wireless network (1),
wherein each node (101, 102, 103) is associated with a different channel (111, 112,
113) of the medium and the access method is performed by using separately each node (101, 102, 103),
transmitting (1002) data using an active node (101) that has gained access to the medium, and
if another node (102, 103) also gains access to the medium after a determined time period from the access of the active node (101), controlling (1003) the active node (101) to release the medium and to start the access method again, and controlling (1003) the other node (102, 103) to start transmitting data.
PCT/EP2019/065907 2019-06-17 2019-06-17 Device and method for gaining access to a medium of a wireless network WO2020253943A1 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
PCT/EP2019/065907 WO2020253943A1 (en) 2019-06-17 2019-06-17 Device and method for gaining access to a medium of a wireless network
EP19731719.1A EP3967098A1 (en) 2019-06-17 2019-06-17 Device and method for gaining access to a medium of a wireless network

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/EP2019/065907 WO2020253943A1 (en) 2019-06-17 2019-06-17 Device and method for gaining access to a medium of a wireless network

Publications (1)

Publication Number Publication Date
WO2020253943A1 true WO2020253943A1 (en) 2020-12-24

Family

ID=66951967

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/EP2019/065907 WO2020253943A1 (en) 2019-06-17 2019-06-17 Device and method for gaining access to a medium of a wireless network

Country Status (2)

Country Link
EP (1) EP3967098A1 (en)
WO (1) WO2020253943A1 (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5553072A (en) * 1995-01-30 1996-09-03 Northrop Grumman Corporation Communication apparatus and method
US20040002357A1 (en) * 2002-06-25 2004-01-01 Mathilde Benveniste Directional antennas and wireless channel access
US20080013522A1 (en) * 2001-11-02 2008-01-17 Mathilde Benveniste Wireless lans and neighborhood capture

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5553072A (en) * 1995-01-30 1996-09-03 Northrop Grumman Corporation Communication apparatus and method
US20080013522A1 (en) * 2001-11-02 2008-01-17 Mathilde Benveniste Wireless lans and neighborhood capture
US20040002357A1 (en) * 2002-06-25 2004-01-01 Mathilde Benveniste Directional antennas and wireless channel access

Also Published As

Publication number Publication date
EP3967098A1 (en) 2022-03-16

Similar Documents

Publication Publication Date Title
US7046651B2 (en) System topologies for optimum capacity transmission over wireless local area networks
US8989106B2 (en) Methods and apparatuses for scheduling uplink request spatial division multiple access (RSDMA) messages in an SDMA capable wireless LAN
JP5518952B2 (en) Fast media access control and direct link protocol
CN107251636B (en) Wireless communication system and method, wireless LAN base station device, and wireless LAN terminal device
US8170052B2 (en) Method of operating a network node of a network, a network node, a network system, a computer-readable medium, and a program element
Naik et al. Can Wi-Fi 7 support real-time applications? On the impact of multi link aggregation on latency
US20050165946A1 (en) Bi-directional wireless LAN channel access
US11122624B2 (en) Pre-packet arrival channel contention
CN107925514B (en) Wireless communication method using trigger information, and wireless communication terminal
US10004109B2 (en) Method and apparatus for recovering data unit in wireless communication system
US20220322460A1 (en) Sharing an edca txop with rta traffic
CN113329439B (en) Resource allocation method based on transmission delay
EP3967098A1 (en) Device and method for gaining access to a medium of a wireless network
Moad et al. Padovan sequence based Backoff Algorithm for improved wireless medium access in MANETs
Tandai et al. MAC efficiency enhancement with prioritized access opportunity exchange protocol for 60 GHz short-range one-to-one communications
US20210235447A1 (en) Method for transmitting frame on basis of plurality of channels in wireless lan system and wireless terminal using same
Wang et al. An efficient contention-based initial access optimization for wireless network protocol
Lai et al. Dynamic backoff time adjustment with considering channel condition for IEEE 802.11 e EDCA

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 19731719

Country of ref document: EP

Kind code of ref document: A1

ENP Entry into the national phase

Ref document number: 2019731719

Country of ref document: EP

Effective date: 20211207

NENP Non-entry into the national phase

Ref country code: DE